http://bugzilla.kernel.org/show_bug.cgi?id=12758





------- Comment #2 from len.br...@intel.com  2009-02-25 15:03 -------
Created an attachment (id=20368)
 --> (http://bugzilla.kernel.org/attachment.cgi?id=20368&action=view)
revert offending patch from 2.6.29-rc6

Thanks for the acpidump.

The DSDT does indeed defines an opregion covering the ELCR:

    OperationRegion (ELCR, SystemIO, 0x04D0, 0x02)
    Field (ELCR, ByteAcc, NoLock, Preserve)
    {
        ELC1,   8,
        ELC2,   8
    }

However, no AML in the system actually references this opregion,
so the Linux warning is a false positive.

Bob Moore pointed out that if we checked our illegal IO port
address list at run-time rather than init-time, then we'd not
have any warnings on this box; and he volunteered to put that
check into upstream ACPICA.

So I'll delete the init-time check from Linux (we've lived without
it from pre-history until 2.6.29-rc) and we'll test the run-time
ACPICA address validation when it becomes available.


-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

------------------------------------------------------------------------------
Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA
-OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise
-Strategies to boost innovation and cut costs with open source participation
-Receive a $600 discount off the registration fee with the source code: SFAD
http://p.sf.net/sfu/XcvMzF8H
_______________________________________________
acpi-bugzilla mailing list
acpi-bugzilla@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/acpi-bugzilla

Reply via email to